Security Analysis of Classical and Post-Quantum Blockchains

被引:0
|
作者
Dahhak, Hajar [1 ]
Afifi, Nadia [1 ]
Hilal, Imane [2 ]
机构
[1] CED ENSEM Hassan2, C3S Lab EST, Lamhamid 5 NR 175, Casablanca, Morocco
[2] Itqan Team ESI, Rabat, Morocco
关键词
Blockchain; post-quantum cryptography; ECDSA; falcon algorithm; DDoS attacks; replay attacks; Sybil attacks; performance evaluation; quantum computing; cybersecurity;
D O I
10.1080/08874417.2024.2433263
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the emergence of quantum computing has created substantial problems to the security of cryptographic methods often utilized in blockchain technology. As quantum computers become more powerful, the possibility of them breaking classical cryptography algorithms such as ECDSA grows, forcing researchers to look for quantum-resistant alternatives. Post-quantum cryptographic algorithms, such as Falcon, have emerged as possible alternatives for long-term blockchain security. This study examines the performance and security of classical (ECDSA) and post-quantum (Falcon) blockchains under a variety of attack scenarios, including DDoS, replay, and Sybil attacks. Our research will evaluate the computational and resource needs of several cryptographic approaches, as well as examine how these infrastructures respond under various attack situations and emphasize the trade-offs between higher security and resource consumption. Our results show that, while post-quantum blockchains are more resistant to quantum computing threats, they need much more CPU and memory than their classical equivalents. This increased resource requirement affects scalability and efficiency, especially in high-load scenarios. Despite their resistance to quantum attacks, post-quantum blockchains are still vulnerable to traditional attack vectors, as demonstrated by the significant computing cost seen throughout our testing. These research results underscore the need of balanced blockchain systems that successfully handle the trade-offs between security and performance.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Towards Post-quantum Security for IoT Endpoints with NTRU
    Guillen, Oscar M.
    Poeppelmann, Thomas
    Mera, Jose M. Bermudo
    Bongenaar, Elena Fuentes
    Sigl, Georg
    Sepulveda, Johanna
    PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 698 - 703
  • [32] Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptography
    Biasse, J-F
    Bonnetain, X.
    Kirshanova, E.
    Schrottenloher, A.
    Song, F.
    IET INFORMATION SECURITY, 2023, 17 (02) : 171 - 209
  • [33] Post-quantum security on the Lai-Massey scheme
    Zhang, Zhongya
    Wu, Wenling
    Sui, Han
    Wang, Bolin
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (08) : 2687 - 2704
  • [34] Post-quantum Techniques in Wireless Network Security: An Overview
    Fakhruldeen, Hassan Falah
    Al-Kaabi, Rana Abbas
    Jabbar, Feryal Ibrahim
    Al-Kharsan, Ibrahim H.
    Shoja, Sarah Jawad
    MALAYSIAN JOURNAL OF FUNDAMENTAL AND APPLIED SCIENCES, 2023, 19 (03): : 337 - 344
  • [35] Post-Quantum Hybrid Security Mechanism for MIMO Systems
    Qassim, Yousef
    Magana, Mario Edgardo
    Yavuz, Attila
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 684 - 689
  • [36] Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs
    Kalai, Yael Tauman
    Vaikuntanathan, Vinod
    Zhang, Rachel Yun
    THEORY OF CRYPTOGRAPHY, TCC 2021, PT I, 2021, 13042 : 330 - 368
  • [37] Hybrid Keys in Practice: Combining Classical, Quantum and Post-Quantum Cryptography
    Ricci, Sara
    Dobias, Patrik
    Malina, Lukas
    Hajny, Jan
    Jedlicka, Petr
    IEEE ACCESS, 2024, 12 : 23206 - 23219
  • [38] A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies
    Hasan, Khondokar Fida
    Simpson, Leonie
    Baee, Mir Ali Rezazadeh
    Islam, Chadni
    Rahman, Ziaur
    Armstrong, Warren
    Gauravaram, Praveen
    McKague, Matthew
    IEEE ACCESS, 2024, 12 : 23427 - 23450
  • [39] Blocklistable Anonymous Credential for Circuits with Post-quantum Security
    Yu, Zuoxia
    Yang, Rupeng
    Susilo, Willy
    Au, Man Ho
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2024, PT II, 2025, 14904 : 83 - 105
  • [40] Hybrid Post-quantum Signatures in Hardware Security Keys
    Ghinea, Diana
    Kaczmarczyck, Fabian
    Pullman, Jennifer
    Cretin, Julien
    Kolbl, Stefan
    Misoczki, Rafael
    Picod, Jean-Michel
    Invernizzi, Luca
    Bursztein, Elie
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2023 SATELLITE WORKSHOPS, ADSC 2023, AIBLOCK 2023, AIHWS 2023, AIOTS 2023, CIMSS 2023, CLOUD S&P 2023, SCI 2023, SECMT 2023, SIMLA 2023, 2023, 13907 : 480 - 499